


default search action
Imad H. Elhajj
Person information
- affiliation: American University of Beirut, Department of Electrical and Computer Engineering, Lebanon
- affiliation: Michigan State University, Department of Electrical and Computer Engineering, East Lansing, MI, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j48]Mahdi Saleh, Imad H. Elhajj, Daniel C. Asmar:
Virtual Testing Methods of Cyber-Physical Systems: A Framework for Testing Instrumentation and Measurement Systems. IEEE Instrum. Meas. Mag. 27(8): 11-15 (2024) - [j47]Malak Slim
, Naseem A. Daher, Imad H. Elhajj:
Dynamic Bandwidth Allocation for Collaborative Multi-Robot Systems Based on Task Execution Measures. J. Intell. Robotic Syst. 110(3): 114 (2024) - [j46]Mahdi Saleh
, Imad H. Elhajj
, Daniel C. Asmar
:
In Situ Sensors for Oil Spill Detection and Thickness Measurement: Methods and Challenges. IEEE Trans. Instrum. Meas. 73: 1-16 (2024) - [c123]Malak Sayour, Mohamad Karim Yassine, Nadim Dib, Imad H. Elhajj, Boulos Asmar, Elie Khoury, Daniel C. Asmar:
HAC-SLAM: Human Assisted Collaborative 3D-SLAM Through Augmented Reality. ICRA 2024: 12978-12984 - [c122]Batool Ibrahim, Imad H. Elhajj, Daniel C. Asmar:
3D Autocomplete: Enhancing UAV Teleoperation with AI in the Loop. ICRA 2024: 17829-17835 - [c121]Nicolas Abboud, Malak Sayour, Imad H. Elhajj, John S. Zelek, Daniel C. Asmar:
Inline Photometrically Calibrated Hybrid Visual SLAM. IROS 2024: 10089-10096 - [i4]Jawad Haidar, Marc Mouawad, Imad H. Elhajj, Daniel C. Asmar:
MaskUno: Switch-Split Block For Enhancing Instance Segmentation. CoRR abs/2407.21498 (2024) - [i3]Yan Song Hu, Nicolas Abboud, Muhammad Qasim Ali, Adam Srebrnjak Yang, Imad H. Elhajj, Daniel C. Asmar, Yuhao Chen, John S. Zelek:
MGSO: Monocular Real-time Photometric SLAM with Efficient 3D Gaussian Splatting. CoRR abs/2409.13055 (2024) - [i2]Nicolas Abboud, Malak Sayour, Imad H. Elhajj, John S. Zelek, Daniel C. Asmar:
Inline Photometrically Calibrated Hybrid Visual SLAM. CoRR abs/2409.16810 (2024) - 2023
- [c120]Hadi El Karhani, Riad Al Jamal, Yorgo Bou Samra, Imad H. Elhajj, Ayman I. Kayssi:
Phishing and Smishing Detection Using Machine Learning. CSR 2023: 206-211 - [c119]Batool Ibrahim, Mohammad Haj Hussein, Imad H. Elhajj, Daniel C. Asmar:
Autocomplete of 3D Motions for UAV Teleoperation. IROS 2023: 7825-7831 - [c118]Reem Nassar, Imad H. Elhajj, Ayman I. Kayssi, Samer Salam:
Feature Relevance in NAT Detection Using Explainable AI. ISCC 2023: 1181-1184 - [c117]Mahmoud Altrabolsi, Mahdi Saleh
, Imad H. Elhajj, Daniel C. Asmar:
Design Optimization of a Multiphase Coplanar Capacitive Sensor. IST 2023: 1-6 - [c116]Ahmad Amine, Mostafa Aldilati, Hadi Hasan, Noel Maalouf, Imad H. Elhajj:
Human-Robot Interaction using VAHR: Virtual Assistant, Human, and Robots in the Loop. RO-MAN 2023: 2176-2182 - [i1]Ahmad Amine, Mostafa Aldilati, Hadi Hasan, Noel Maalouf, Imad H. Elhajj:
Human-Robot Interaction using VAHR: Virtual Assistant, Human, and Robots in the Loop. CoRR abs/2303.17582 (2023) - 2022
- [j45]Ola Salman
, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab
:
Mutated traffic detection and recovery: an adversarial generative deep learning approach. Ann. des Télécommunications 77(5-6): 395-406 (2022) - [j44]Ola Salman, Imad H. Elhajj, Ali Chehab
, Ayman I. Kayssi:
Towards efficient real-time traffic classifier: A confidence measure with ensemble Deep Learning. Comput. Networks 204: 108684 (2022) - [j43]Ola Salman
, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
A machine learning based framework for IoT device identification and abnormal traffic detection. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j42]Daniel C. Asmar
, Rema Daher, Yasmine Hawari, Hiam Khoury, Imad H. Elhajj:
Automated building and evaluation of 2D as-built floor plans. Mach. Vis. Appl. 33(3): 36 (2022) - [j41]Mahdi Saleh
, Ali Rida Tabikh
, Imad H. Elhajj
, Kristi McKinney
, Daniel C. Asmar
:
Dual-Modality Capacitive-Ultrasonic Sensing for Measuring Floating Oil Spill Thickness. IEEE Trans. Instrum. Meas. 71: 1-14 (2022) - [c115]Anas Al Shaghouri, Imad H. Elhajj, Daniel C. Asmar:
Real-Time Measurement of Viscosity Using Coplanar Capacitive Sensor. I2MTC 2022: 1-6 - [c114]Mohammad Haj Hussein, Batool Ibrahim, Imad H. Elhajj, Daniel C. Asmar:
Incremental Learning for Enhanced Personalization of Autocomplete Teleoperation. ICRA 2022: 515-521 - [c113]Zahraa Awad, Celine Chibani, Noel Maalouf, Imad H. Elhajj:
Human-Aided Online Terrain Classification for Bipedal Robots Using Augmented Reality. ROBIO 2022: 1352-1358 - [c112]Sheng Bi, Chuanhong Guo, Wenxing Yang, Geoge Zhang, JiangCheng Chen, Yu Wang, Imad H. Elhajj, Roy Vellaisamy:
A software framework for internet telerobot based on ROS. ROBIO 2022: 2311-2316 - [c111]Mahmoud Altrabolsi, Chafic Labaki, Imad H. Elhajj, Daniel C. Asmar:
Detection and Thickness Estimation of Oil under Saline Ice Using Machine Learning. SAS 2022: 1-6 - 2021
- [j40]Zahraa Bassyouni
, Imad H. Elhajj:
Augmented Reality Meets Artificial Intelligence in Robotics: A Systematic Review. Frontiers Robotics AI 8 (2021) - [j39]Ola Salman
, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Data representation for CNN based internet traffic classification: a comparative study. Multim. Tools Appl. 80(11): 16951-16977 (2021) - [j38]Louma Chaddad, Ali Chehab
, Imad H. Elhajj, Ayman I. Kayssi:
Optimal Packet Camouflage Against Traffic Analysis. ACM Trans. Priv. Secur. 24(3): 22:1-22:23 (2021) - [c110]Reem Nassar, Imad H. Elhajj, Ayman I. Kayssi, Samer Salam:
Identifying NAT Devices to Detect Shadow IT: A Machine Learning Approach. AICCSA 2021: 1-7 - [c109]Wafic El-Ariss
, Naseem A. Daher, Imad H. Elhajj
:
To Resume or Not to Resume: A Behavior Tree Extension. ACC 2021: 770-776 - [c108]Mohammad Kassem Zein, Majd Al Aawar, Daniel C. Asmar, Imad H. Elhajj:
Deep Learning and Mixed Reality to Autocomplete Teleoperation. ICRA 2021: 4523-4529 - [c107]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab
:
Centralization vs. De-Centralization: Where Does the Network Control Plane Stand? SDS 2021: 1-6 - [d5]Zahraa Awad, Raja Akel, Noel Maalouf, Imad H. Elhajj:
Humanoid Terrain Characterization Dataset. IEEE DataPort, 2021 - 2020
- [j37]Ola Salman
, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
A review on machine learning-based approaches for Internet traffic classification. Ann. des Télécommunications 75(11): 673-710 (2020) - [j36]Sarah Abdallah
, Ayman I. Kayssi
, Imad H. Elhajj
, Ali Chehab
:
Performance analysis of SDN vs OSPF in diverse network environments. Concurr. Comput. Pract. Exp. 32(21) (2020) - [j35]Noel Maalouf
, Imad H. Elhajj
, Elie A. Shammas, Daniel C. Asmar
:
Biomimetic Energy-Based Humanoid Gait Design. J. Intell. Robotic Syst. 100(1): 203-221 (2020) - [c106]Mohammad Kassem Zein, Abbas Sidaoui, Daniel C. Asmar
, Imad H. Elhajj
:
Enhanced Teleoperation Using Autocomplete. ICRA 2020: 9178-9184 - [c105]Mahdi Saleh
, Imad H. Elhajj
, Daniel C. Asmar
, Sally Antoun:
Real-time Detection of Oil Viscosity Using Coplanar Capacitive Sensors. IEEE SENSORS 2020: 1-4 - [c104]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Network Obfuscation for Net Worth Security. SDS 2020: 83-88 - [c103]Joseph Nasr, Georges Younes, Daniel C. Asmar
, Imad H. Elhajj
:
Resolving Empty Patches in Vision-based Scene Reconstructions. SMC 2020: 3312-3318 - [d4]Peter Beaini, Imad H. Elhajj, Ayman I. Kayssi:
Gaming Network Traffic Dataset. IEEE DataPort, 2020 - [d3]Justin Elhalabi, Majd Al Aawar, Mohammad Kassem Zein, Imad H. Elhajj, Daniel C. Asmar:
Drone Motion Primitive Dataset. IEEE DataPort, 2020 - [d2]Sameh Farhat, Imad H. Elhajj, Ayman I. Kayssi:
NAT Network Traffic Dataset. IEEE DataPort, 2020 - [d1]Mahdi Saleh
, Imad H. Elhajj, Daniel C. Asmar:
Dataset for binary classification of digital sensor signals. IEEE DataPort, 2020
2010 – 2019
- 2019
- [j34]Farah Saab, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Modelling Cognitive Bias in Crowdsourcing Systems. Cogn. Syst. Res. 58: 1-18 (2019) - [j33]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
AdaptiveMutate: a technique for privacy preservation. Digit. Commun. Networks 5(4): 245-255 (2019) - [j32]Riwa Mouawi
, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Crowdsourcing for click fraud detection. EURASIP J. Inf. Secur. 2019: 11 (2019) - [j31]Mahdi Saleh
, Ghassan Oueidat, Imad H. Elhajj
, Daniel C. Asmar
:
In Situ Measurement of Oil Slick Thickness. IEEE Trans. Instrum. Meas. 68(7): 2635-2647 (2019) - [c102]Haytham M. Dbouk, Rayan AlSayed Ali, Mohammad Ghamlouch, Imad H. Elhajj
:
Temperature Control for Residential Solar Water Heating Systems. EUROCON 2019: 1-6 - [c101]Mahdi Saleh
, Imad H. Elhajj
, Daniel C. Asmar
:
An Opportunistic Approach for Mitigating Fouling in the Measurement of Oil Thickness. I2MTC 2019: 1-6 - [c100]Mahdi Saleh
, Imad H. Elhajj
, Daniel C. Asmar
:
Capacitive Sensing for Measuring Oil Thickness Under Fouling Conditions. I2MTC 2019: 1-6 - [c99]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Mobile Traffic Anonymization Through Probabilistic Distribution. ICIN 2019: 242-248 - [c98]Abbas Sidaoui, Mohammad Kassem Zein, Imad H. Elhajj
, Daniel C. Asmar
:
A-SLAM: Human in-the-loop Augmented SLAM. ICRA 2019: 5245-5251 - [c97]Abbas Sidaoui, Imad H. Elhajj
, Daniel C. Asmar
:
Collaborative Human Augmented SLAM. IROS 2019: 2131-2138 - [c96]Ola Salman, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery. MLN 2019: 99-116 - [c95]Ali Hussein, Ola Salman, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Machine Learning for Network Resiliency and Consistency. SDS 2019: 146-153 - 2018
- [j30]Serge Mghabghab, Imad H. Elhajj
, Daniel C. Asmar
:
Personalized teleoperation via intention recognition. Adv. Robotics 32(13): 697-716 (2018) - [j29]Ola Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
IoT survey: An SDN and fog computing perspective. Comput. Networks 143: 221-246 (2018) - [j28]Georgi A. Ajaeiya
, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi, Marc Kneppers:
Mobile Apps identification based on network flows. Knowl. Inf. Syst. 55(3): 771-796 (2018) - [c94]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Adaptive Optimization for Hybrid Network Control Planes. AICCSA 2018: 1-8 - [c93]Riwa Mouawi, Mariette Awad
, Ali Chehab
, Imad H. Elhajj, Ayman I. Kayssi:
Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing. IIT 2018: 88-92 - [c92]Louma Chaddad, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
App traffic mutation: Toward defending against mobile statistical traffic analysis. INFOCOM Workshops 2018: 27-32 - [c91]Abbas Sidaoui, Imad H. Elhajj
, Daniel C. Asmar
:
Human-in-the-loop Augmented Mapping. IROS 2018: 3190-3195 - [c90]Ola Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
A Multi-level Internet Traffic Classifier Using Deep Learning. NOF 2018: 68-75 - [c89]Sarah Abdallah, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
A Network Management Framework for SDN. NTMS 2018: 1-4 - [c88]Ali Hussein, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
SDN for QUIC: an enhanced architecture with improved connection establishment. SAC 2018: 2136-2139 - [c87]Ali Hussein, Ali Chehab
, Ayman I. Kayssi, Imad H. Elhajj
:
Machine learning for network resilience: The start of a journey. SDS 2018: 59-66 - [c86]Ola Salman, Louma Chaddad, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Pushing intelligence to the network edge. SDS 2018: 87-92 - [c85]Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Network convergence in SDN versus OSPF networks. SDS 2018: 130-137 - 2017
- [j27]Khodor Hamandi, Jacques Bou Abdo, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Comput. Commun. 98: 20-30 (2017) - [j26]Georges Younes, Rany Kahil, Mayssa Jallad, Daniel C. Asmar
, Imad H. Elhajj
, George Turkiyyah, Howayda Al-Harithy:
Virtual and augmented reality for rich interaction with cultural heritage sites: A case study from the Roman Theater at Byblos. Digit. Appl. Archaeol. Cult. Heritage 5: 1-9 (2017) - [j25]Georges Younes, Daniel C. Asmar
, Imad H. Elhajj
, Howayda Al-Harithy:
Pose tracking for augmented reality applications in outdoor archaeological sites. J. Electronic Imaging 26(1): 11004 (2017) - [j24]Sami Malek, Sarah Abdallah, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Low-power and high-speed shift-based multiplier for error tolerant applications. Microprocess. Microsystems 52: 566-574 (2017) - [j23]Noel Maalouf, Imad H. Elhajj
, Elie A. Shammas, Daniel C. Asmar
:
Humanoid push recovery using sensory reweighting. Robotics Auton. Syst. 94: 208-218 (2017) - [c84]Ola Salman, Ayman I. Kayssi, Ali Chehab
, Imad H. Elhajj
:
Multi-level security for the 5G/IoT ubiquitous network. FMEC 2017: 188-193 - [c83]Ali Hussein, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
SDN for MPTCP: An enhanced architecture for large data transfers in datacenters. ICC 2017: 1-7 - [c82]Georgi A. Ajaeiya, Nareg Adalian, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Flow-based Intrusion Detection System for SDN. ISCC 2017: 787-793 - [c81]Ola Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
QoS guarantee over hybrid SDN/non-SDN networks. NOF 2017: 141-143 - [c80]Georges Chahine
, Daniel C. Asmar
, Maya Antoun, Elie A. Shammas, Imad H. Elhajj
:
Ask the OWL: Object detection constrained by a probabilistic ontological model. ROBIO 2017: 2540-2547 - [c79]Noel Maalouf, Imad H. Elhajj
, Elie A. Shammas, Daniel C. Asmar
:
Energy-based control applied to humanoid robots. ROBIO 2017: 2591-2598 - [c78]Noel Maalouf, Imad H. Elhajj
, Elie A. Shammas, Daniel C. Asmar
:
Imitating humans: Humanoid gait design based on energy exchange. ROBIO 2017: 2599-2604 - [c77]Ali Hussein, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
SDN VANETs in 5G: An architecture for resilient security services. SDS 2017: 67-74 - [c76]Ola Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Software Defined IoT security framework. SDS 2017: 75-80 - [c75]Sarah Abdallah, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Fuzzy decision system for technology choice in hybrid networks. SDS 2017: 106-111 - 2016
- [j22]Imad H. Elhajj
, Mihran Gurunian, Nadeen R. Rishani
:
Applied instrumentation for civil engineering at the American University of Beirut. IEEE Instrum. Meas. Mag. 19(6): 46-51 (2016) - [j21]George E. Sakr, Imad H. Elhajj
:
VC-based confidence and credibility for support vector machines. Soft Comput. 20(1): 133-147 (2016) - [c74]Raghid Morcel, Hadi Sarieddeen
, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Proactive channel allocation for multimedia applications over CSMA/CA-based CRNs. ACTEA 2016: 178-183 - [c73]Abed AlRahman Al Makdah
, Elie A. Shammas, Naseem A. Daher, Imad H. Elhajj
:
Modeling and optimal three-dimensional trajectory tracking for an autonomous underwater vehicle. AIM 2016: 172-177 - [c72]Maha Shamseddine, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
VNCS: Virtual Network Connectivity as a Service a Software-Defined Networking Approach. IC2E Workshops 2016: 30-35 - [c71]Ali Hussein, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
SDN Security Plane: An Architecture for Resilient Security Services. IC2E Workshops 2016: 54-59 - [c70]Ali Hussein, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
SDN verification plane for consistency establishment. ISCC 2016: 519-524 - [c69]Ola Salman, Sarah Abdallah, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Identity-based authentication scheme for the Internet of Things. ISCC 2016: 1109-1111 - [c68]Maha Shamseddine, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi, Wassim Itani:
NCaaS: network configuration as a service in SDN-driven cloud architectures. SAC 2016: 448-454 - [c67]Farah Saab, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
A crowdsourcing game-theoretic intrusion detection and rating system. SAC 2016: 622-625 - [c66]Farah Saab, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Solving sybil attacks using evolutionary game theory. SAC 2016: 2195-2201 - 2015
- [j20]Wassim Itani, Cesar Ghali, Ayman I. Kayssi, Ali Chehab
, Imad H. Elhajj
:
G-Route: an energy-aware service routing protocol for green cloud computing. Clust. Comput. 18(2): 889-908 (2015) - [j19]Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Energy-Efficient Security for Voice over IP. Int. J. Netw. Secur. 17(1): 7-22 (2015) - [j18]Khodor Hamandi, Alaa Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Messaging Attacks on Android: Vulnerabilities and Intrusion Detection. Mob. Inf. Syst. 2015: 746930:1-746930:13 (2015) - [j17]Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab
, Imad H. Elhajj
, Wassim Itani:
CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks. Sensors 15(2): 3299-3333 (2015) - [j16]Salwa Adriana Saab, Farah Saab, Ayman I. Kayssi, Ali Chehab
, Imad H. Elhajj
:
Partial mobile application offloading to the cloud for energy-efficiency with security measures. Sustain. Comput. Informatics Syst. 8: 38-46 (2015) - [c65]Ola Salman, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
An architecture for the Internet of Things with decentralized data and centralized control. AICCSA 2015: 1-8 - [c64]Ali Kanso, Imad H. Elhajj
, Elie A. Shammas, Daniel C. Asmar
:
Enhanced teleoperation of UAVs with haptic feedback. AIM 2015: 305-310 - [c63]Noel Maalouf, Imad H. Elhajj
, Daniel C. Asmar
, Elie A. Shammas:
Model-free human-like humanoid push recovery. ROBIO 2015: 1560-1565 - [c62]Ola Salman, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
Edge computing enabling the Internet of Things. WF-IoT 2015: 603-608 - [c61]Riwa Mouawi, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Comparison of in-app ads traffic in different ad networks. WiMob 2015: 581-587 - 2014
- [j15]Mehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Fast dynamic internet mapping. Future Gener. Comput. Syst. 39: 55-66 (2014) - [j14]Alaa Atassi, Naoum Sayegh, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Decentralised malicious node detection in WSN. Int. J. Space Based Situated Comput. 4(1): 15-25 (2014) - [c60]Khaled Bakhit, Chantal Chalouhi, Sabine Francis, Sara Mourad, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
3G to Wi-Fi offloading on Android. AICCSA 2014: 247-252 - [c59]Alaa Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Mobile malware exposed. AICCSA 2014: 253-258 - [c58]Khaled Bakhit, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
DAGGER: Distributed architecture for granular mitigation of mobile based attacks. AICCSA 2014: 259-265 - [c57]Farah Saab, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
CrowdApp: Crowdsourcing for application rating. AICCSA 2014: 551-556 - [c56]Joseph Loutfi, Ali Chehab
, Imad H. Elhajj
, Ayman I. Kayssi:
Smartphone sensors as random bit generators. AICCSA 2014: 773-780 - [c55]Jacques Bou Abdo, Imad Sarji, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Application-Aware Fast Dormancy in LTE. AINA 2014: 194-201 - [c54]Alaa Salman, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
DAIDS: An Architecture for Modular Mobile IDS. AINA Workshops 2014: 328-333 - [c53]Ayman Mukaddam, Imad H. Elhajj
, Ayman I. Kayssi, Ali Chehab
:
IP Spoofing Detection Using Modified Hop Count. AINA 2014: 512-516 - [c52]Khaled Bakhit, Sirine Taleb
, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
CAVE: Hybrid Approach for In-Network Content Caching. UIC/ATC/ScalCom 2014: 649-654 - 2013
- [j13]Jalal Awed, Imad H. Elhajj
, Ali Chehab
, Ayman I. Kayssi:
Perception-aware packet-loss resilient compression for networked haptic systems. Comput. Commun. 36(15-16): 1621-1628 (2013) - [j12]